TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 10.

Tamrakar, Sandeep and Liu, Jian and Paverd, Andrew and Ekberg, Jan-Erik and Pinkas, Benny and Asokan, N. (2017):
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, DOI: 10.1145/3052973.3053006,
[Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference or Workshop Item]

Tamrakar, Sandeep and Ekberg, Jan-Erik and Laitinen, Pekka (2015):
On Rehoming the Electronic Id to TEEs.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, [Conference or Workshop Item]

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, pp. 1189-1206, 102, (8), [Article]

Nyman, Thomas and Ekberg, Jan-Erik and Asokan, N. (2014):
Citizen Electronic Identities using {TPM} 2.0.
In: CoRR, abs/1409.1023, [Article]

Ekberg, Jan-Erik and Kostiainen, Kari and Asokan, N. (2014):
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, pp. 29-37, 12, (4), DOI: 10.1109/MSP.2014.38,
[Article]

Bugiel, Sven and Ekberg, Jan-Erik (2010):
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC 2010), [Conference or Workshop Item]

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. (2010):
Key Attestation from Trusted Execution Environments.
In: TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, [Conference or Workshop Item]

Ekberg, Jan-Erik and Bugiel, Sven (2009):
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
In: 4th Annual Workshop on Scalable Trusted Computing (STC2009), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wolf, Christopher and Stüble, Christian and Asokan, N. and Ekberg, Jan-Erik (2007):
Enabling Fairer Digital Rights Management with Trusted Computing.
In: 10th International Conference on Information Security (ISC 2007), Springer Verlag, Valparaíso, Chile, In: LNCS, 4779, [Conference or Workshop Item]

This list was generated on Sat Jul 20 00:43:16 2019 CEST.